WO2005109207A1 - Méthode pour acquérir automatiquement une authentification de temps de fichier électronique et terminal de communication ayant une fonction d’acquisition automatique d’authentification de temps de fichier électronique - Google Patents

Méthode pour acquérir automatiquement une authentification de temps de fichier électronique et terminal de communication ayant une fonction d’acquisition automatique d’authentification de temps de fichier électronique Download PDF

Info

Publication number
WO2005109207A1
WO2005109207A1 PCT/JP2004/006405 JP2004006405W WO2005109207A1 WO 2005109207 A1 WO2005109207 A1 WO 2005109207A1 JP 2004006405 W JP2004006405 W JP 2004006405W WO 2005109207 A1 WO2005109207 A1 WO 2005109207A1
Authority
WO
WIPO (PCT)
Prior art keywords
hash value
time
electronic file
value list
electronic
Prior art date
Application number
PCT/JP2004/006405
Other languages
English (en)
Japanese (ja)
Inventor
Katsumi Honda
Original Assignee
Hypergear Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hypergear Inc filed Critical Hypergear Inc
Priority to PCT/JP2004/006405 priority Critical patent/WO2005109207A1/fr
Publication of WO2005109207A1 publication Critical patent/WO2005109207A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/121Timestamp

Definitions

  • the present invention relates to an electronic file time authentication automatic acquisition method, and a communication terminal device having an electronic file time authentication automatic acquisition function.
  • the present invention relates to a method for automatically acquiring time certification by a time certification organization for an electronic file created by a computer or the like and easily detecting tampering of an electronic file, and a communication terminal device capable of implementing this method.
  • the above-mentioned hardware method has poor cost performance
  • the above-mentioned software method only proves that the creator having the digital certificate has created the electronic file. Since it is not a proof, it is easy for the creator himself to falsify the electronic file.
  • the time certification organization can receive the hash value of the electronic file from the creator of the electronic file, apply the electronic signature to the hash value, and prove the existence of the electronic file at that time.
  • each electronic file that has been electronically signed is merely a proof of the time authentication, and when there are multiple electronic files, they are chronologically aggregated. Since the content is not proved in units, it is difficult to confirm the fact that a specific file is intentionally deleted from multiple electronic files.
  • Patent Document 1 Even with the technology of Patent Document 1 described above, even if falsification of the contents of a specific file or intentional omission can be prevented, the service provider verifies that there is no omission in the time-authenticated electronic file. But there is no simple way for a third party to verify this.
  • the service provider can certify that the content of the specified file has not been tampered with or deleted by combining the weekly integrated hash value sent to the service provider with the specified file and the newspaper
  • the present invention is proposed in consideration of the above circumstances, and newly creates a hash value list in which hash values generated for each electronic file are put together in a plurality of electronic file units.
  • an automatic electronic file time certification system that allows a third party to easily verify the authenticity of the specified file and whether the specified file has been intentionally deleted. It is an object of the present invention to provide a communication terminal device having an acquisition method and an electronic file time authentication automatic acquisition function.
  • the present application proposes the following method and communication terminal device.
  • a hash function and a hash value are a one-way function that cannot reproduce the original text from the generated data, and data that is summarized to a predetermined length from a series of documents and numbers using such a one-way function. Means the whole.
  • the time stamp token information includes a hash value list or a hash value of the hash value list together with the time authentication information by the time authentication organization.
  • Such time stamp token information is based on the independent token method, In the former independent token method, the time information is digitally signed by a time certification organization and the time certification organization performs a third-party assurance, and can be treated as an electronic signature file. Yes, there are a method using message authentication code and an archive method. The latter link token method uses a hash algorithm, and the time stamping organization receives a hash value of electronic data from the user and returns a link token as evidence.
  • Claims 2 to 6 propose a communication terminal device having an electronic file time authentication automatic acquisition function.
  • electronic file 'hash value list creating means for generating a hash value list listing hash values calculated for each of the plurality of electronic files, and a hash value list generated by the creating means, Alternatively, a hash value generated based on the electronic data is generated, and the generated hash value list or hash value is transmitted to the time stamping organization through a communication network, and the time stamping organization issues a time stamp.
  • An electronic file time authentication automatic acquisition function comprising: a time authentication automatic acquisition means for receiving token information; and a time-authenticated data storage means for storing the time stamp token information received by the time authentication automatic acquisition means. Prepare.
  • the electronic file 'hash value list generating means incorporates the hash value calculated based on the already generated hash value list into the newly generated hash value list to generate the integrated hash value list. It has a function to generate.
  • the electronic file for which the time authentication is to be confirmed and the time stamp token information are read, and whether or not the electronic file is included in the hash value list time-authenticated by the time stamp token information is determined. And a time authentication verifying means for judging the time.
  • the time authentication means further has a function of confirming the expiration date when the time stamp token information includes the expiration date data of the time authentication.
  • Claim 6 has a function of reading a hash value list that has been time-authenticated using the time stamp token information that has been time-authenticated by the method of claim 1, and searching for an electronic file listed in the hash value list. ing.
  • a step of listing a hash value calculated by applying a predetermined hash function to each of the electronic files to generate a hash value list, and based on the generated hash value list or the electronic data thereof Transmitting the hash value calculated to the time stamp authority through the communication network, receiving the time stamp token information from the time stamp authority, and storing the time stamp token information. Verify the authenticity of a particular file, or Can be verified whether it is missing.
  • the service provider publishes in the newspaper a hash value that takes into account the history of hash values of all clients or all electronic files for each client, and compares it with the conventional method that guarantees the authenticity of electronic files. For example, it is not necessary to publish such a hash value for every client or each client, and the authenticity of an electronic file can be easily verified for each communication terminal device of each client, which is convenient and convenient. is there.
  • the number of times of authentication is reduced and the cost can be reduced as compared with the case where the time is certified by a time certification organization for each electronic file.
  • the hash value list generated by the hash value list generating means, or the hash value generated based on the electronic data thereof, is transmitted to the time certification organization through the communication network, and the time stamp token information is received. Since the time stamp token information is stored in association with the hash value list, the method of claim 1 can be realized with a simple configuration.
  • the integrated hash value list is generated by incorporating the hash value generated from the already generated hash value list into the newly generated hash value list, it is possible to make the hash value list have continuity. It is also possible to suppress intentional omission of the hash value list.
  • the electronic file for which the time authentication is to be confirmed and the hash value list which has been time-authenticated by the time stamp token information are read, and the hash value of the electronic file is time-authenticated by the time stamp token information. It is possible to easily verify whether or not the desired electronic file is the same as the time-authenticated electronic file, that is, whether or not it has been tampered with, by the user's communication terminal device because it is determined whether the electronic file is included in the hash value .
  • FIG. 1 is a block diagram showing an example of the communication terminal device of the present invention.
  • FIG. 2 is a flowchart for explaining the procedure for the time authentication automatic acquisition function.
  • FIG. 3 is a diagram schematically illustrating an example of a hash value list.
  • FIG. 4 is a diagram for explaining the integrated hash value list.
  • FIG. 5 is a diagram schematically illustrating an example of the time stamp token information.
  • FIG. 6 is a diagram schematically showing a series of operations of the time authentication automatic acquisition function.
  • FIG. 7 is a diagram for explaining the electronic file missing verification function.
  • FIG. 8 is a flowchart for explaining the electronic file identity verification function.
  • FIG. 9 is a flowchart for explaining the electronic file search function. BEST MODE FOR CARRYING OUT THE INVENTION
  • a hash value is calculated by applying a predetermined hash function to each of the electronic files, and a hash value list is generated by listing the hash values. Or transmitting the hash value of the electronic data to the time stamp organization via the communication network, receiving the time stamp token information from the time stamp organization, and storing the time stamp token information.
  • FIG. 1 is a block diagram showing an example of a main configuration of this device.
  • the communication terminal device 1 includes an input / output unit 11 for creating, modifying, and saving an electronic file, and an electronic device for generating a hash value list in which hash values calculated for each of a plurality of electronic files are listed.
  • File ⁇ Hash value list creating means 12 and a hash value list generated by this creating means 12 or a hash value of the electronic data thereof are generated, and the generated hash value list or hash value is communicated.
  • Time authentication automatic acquisition means 13 for making a time authentication request and transmitting it to the time authentication organization 2 according to a predetermined communication procedure through the network N, and receiving time stamp token information from the time authentication organization 2, Time stamp automatic acquisition means 13 Associates the time stamp token information received by the time authenticated hash value list.
  • Time-authenticated data storage means 14 for storing, time-authentication verification means 15 having a function to be described later, an interface 16 for connecting to a communication network N (for example, the Internet), and storage means 17 And electronic file search means 18.
  • the hash value list creating means 12 reads all the hash values of the electronic file stored in the storage means 17 and lists them in a hash value list (see FIG. 3). ) Is created and stored in storage means 1 1 to prepare for the B temple engraving certification request (104).
  • the hash value list is further hashed to obtain hash values (see Fig. 3).
  • a hash value list integrating the hash value list may be generated and stored in the storage unit 17 (105).
  • Figure 3 shows a schematic diagram of the hash value list.
  • This list L1 describes hash values h1 to h5 calculated from each electronic file.
  • the hash value h is obtained by further integrating these hash values h1 to h5 and hashing them.
  • the list L1 or the hash value h ′ of the list is obtained by the time authentication automatic acquisition means 13 through the communication network N. It sends it to the time stamping authority, makes a predetermined time stamping request, and receives time stamp token information (106, 107).
  • the creation of the hash value list is automatically performed at a predetermined time, but every time the electronic file is stored or updated a predetermined number of times (for example, every 10 times). You may go to.
  • a hash value list of all the electronic files in the storage unit 17 is created.
  • a hash value list may be created for only one copy of all the files, and a hash value list is generated by selecting an electronic file from which the user wishes to receive time authentication. May be.
  • the time stamp token information is received from the time certification authority after such processing, the time stamp token information is stored in the time-authenticated data storage unit 14 and the hash value created by the hash value list generating unit 12 is used. Related to list Then, the data is stored in the time-authenticated data storage means 14 (108).
  • FIG. 4 is a diagram showing a procedure for generating an integrated nose value list.
  • the hash value list incorporates the hash values of the previously generated hash value list, so that the hash value list can have continuity. Missing can be prevented.
  • FIG. 5 is a diagram schematically showing time stamp token information including a hash value list subjected to time authentication.
  • This list L2 is assumed to be saved as a file that can be viewed with generally commercially available software (for example, Adobe Acrobat Reader (registered trademark)). This is convenient because it allows you to visually check and verify changes and omissions in hash values in conjunction with the stored hash value list.
  • Adobe Acrobat Reader registered trademark
  • S is an electronic time stamp given to indicate that the time has been certified by the B temple engraving authority 2.
  • the digital signature file is encrypted with the private key of the B-Temple Certificate Authority 2, which includes time authentication information and authentication time. Since the data and the contents of the hash value list, that is, the hash value of each hash value or all hash values, and the time authentication expiration date data are included, this electronic signature file is specified and the time authentication authority 2 When decryption is performed using the public key, the time authentication information can be confirmed by the communication terminal device 1.
  • time stamp token information authenticated by the B temple engraving authority 2 includes an expiration date in the time authentication information, the validity can be confirmed.
  • FIG. 6 is a system diagram for schematically explaining the time authentication automatic acquisition function described above.
  • the list L 1 or the hash value h ′ of the list L 1 is transmitted to the time authentication organization 2 through the communication network N, and a time authentication request is made according to a predetermined procedure to receive time authentication.
  • the electronic file included in the hash value list, which has been time-authenticated based on the time stamp token information, may be stored in association with a hyperlink.
  • FIG. 7 is an explanatory diagram of the electronic file missing verification function.
  • Fig. 7 shows an example in which one hash value list is generated for all electronic files for one day, and the time for the hash value list corresponding to April 13, 2004 is shown. The stamp was obtained at 00:01:10 on April 14, 2004.
  • FIG. 8 is a flowchart for explaining the electronic file identity verification function.
  • the time authentication verifying unit 15 already acquires the time stamp token information and performs the time authentication.
  • the hash value list L2 stored in the used data storage means 14 is sequentially read (2 0 1), the hash value of the designated electronic file is obtained (2 0 2), and the hash value is read from the list. Determine whether it exists in L2.
  • the hash value of the electronic file is included in the hash value list, it is guaranteed that the electronic file has not been tampered with. If the hash value does not include the same hash value, the electronic file is time-authenticated. It is not the same as the one, and it can be easily found and tampered with.
  • FIG. 9 is a flowchart for explaining the electronic file search function. That is, the electronic file search means 18 reads the time-authenticated hash value list L2 stored in the storage means 14 (300).
  • the electronic file search means 18 stores the electronic file corresponding to the hash value in the storage means 1
  • the search means 18 searches the storage means 17 for the electronic file corresponding to the input hash value, Display it (302,303).
  • the array of hash values in the hash value lists L1 and L2 is random, but the arrays are arranged in a predetermined sort order such as file update time, name / number order, hash value order, and the like. This makes it easier for the human eye to easily identify which of the hash values arranged in a particular sort order has been tampered with or missing.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

Méthode pour acquérir automatiquement une authentification de temps de fichier électronique comprenant une étape de création d’une liste de valeurs de hachage en listant les valeurs de hachage calculées en appliquant une fonction prédéterminée de hachage à une pluralité de fichiers électroniques et une étape de transmission de la liste de valeurs de hachage ainsi créée ou de la valeur de hachage des données électroniques à une autorité d’authentification de temps au travers d’un réseau de communication et le stockage de l’information de jeton de tampon horaire reçue de l’autorité d’authentification de temps.
PCT/JP2004/006405 2004-05-06 2004-05-06 Méthode pour acquérir automatiquement une authentification de temps de fichier électronique et terminal de communication ayant une fonction d’acquisition automatique d’authentification de temps de fichier électronique WO2005109207A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/JP2004/006405 WO2005109207A1 (fr) 2004-05-06 2004-05-06 Méthode pour acquérir automatiquement une authentification de temps de fichier électronique et terminal de communication ayant une fonction d’acquisition automatique d’authentification de temps de fichier électronique

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/JP2004/006405 WO2005109207A1 (fr) 2004-05-06 2004-05-06 Méthode pour acquérir automatiquement une authentification de temps de fichier électronique et terminal de communication ayant une fonction d’acquisition automatique d’authentification de temps de fichier électronique

Publications (1)

Publication Number Publication Date
WO2005109207A1 true WO2005109207A1 (fr) 2005-11-17

Family

ID=35320381

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2004/006405 WO2005109207A1 (fr) 2004-05-06 2004-05-06 Méthode pour acquérir automatiquement une authentification de temps de fichier électronique et terminal de communication ayant une fonction d’acquisition automatique d’authentification de temps de fichier électronique

Country Status (1)

Country Link
WO (1) WO2005109207A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10410247B2 (en) * 2015-01-15 2019-09-10 Adobe Inc. Audio data sampling and user profile generation for advertisement control

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH10283263A (ja) * 1997-04-07 1998-10-23 Fujitsu Ltd 記録媒体におけるデータ保存方式、記録媒体のフォーマット構造および記録媒体
JPH10289523A (ja) * 1997-04-10 1998-10-27 Fujitsu Ltd データ保存装置及びデータ保存方法
JP2002092220A (ja) * 1990-08-02 2002-03-29 Telcordia Technol Inc 数値文書にタイムスタンプを確実に押す方法。
JP2002182963A (ja) * 2000-12-19 2002-06-28 Ricoh Co Ltd セキュア電子メディア管理方法
JP2003223364A (ja) * 2002-01-29 2003-08-08 Seiko Instruments Inc 電子データ管理システム及び管理方法並びに管理プログラム

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002092220A (ja) * 1990-08-02 2002-03-29 Telcordia Technol Inc 数値文書にタイムスタンプを確実に押す方法。
JPH10283263A (ja) * 1997-04-07 1998-10-23 Fujitsu Ltd 記録媒体におけるデータ保存方式、記録媒体のフォーマット構造および記録媒体
JPH10289523A (ja) * 1997-04-10 1998-10-27 Fujitsu Ltd データ保存装置及びデータ保存方法
JP2002182963A (ja) * 2000-12-19 2002-06-28 Ricoh Co Ltd セキュア電子メディア管理方法
JP2003223364A (ja) * 2002-01-29 2003-08-08 Seiko Instruments Inc 電子データ管理システム及び管理方法並びに管理プログラム

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10410247B2 (en) * 2015-01-15 2019-09-10 Adobe Inc. Audio data sampling and user profile generation for advertisement control

Similar Documents

Publication Publication Date Title
US7698557B2 (en) System and method for generating a digital certificate
US8549303B2 (en) Apparatus, system and method for electronically signing electronic transcripts
US20020004800A1 (en) Electronic notary method and system
US7574605B2 (en) Method of managing digital signature, apparatus for processing digital signature, and a computer readable medium for recording program of managing digital signature
EP0940945A2 (fr) Procédé et dispositif de certification et de sauvegarde sécurisée de documents électroniques
US20050132201A1 (en) Server-based digital signature
US20090327732A1 (en) Long-term secure digital signatures
CN110785760A (zh) 用于登记数字文档的方法和系统
US20020048372A1 (en) Universal signature object for digital data
US20070016788A1 (en) Digital signature computer, system, method, and storage medium storing program for collectively affixing signature to plurality of messages
JP2001518269A (ja) 電子暗号パッキング
JP2001142398A (ja) フォルダ型時刻認証システムおよび分散時刻認証システム
WO2008063850A2 (fr) Système et procédé de gestion et d'authentification de fichiers numériques
JP5958703B2 (ja) データ証明システムおよびデータ証明サーバ
US6742119B1 (en) Time stamping method using time delta in key certificate
KR20200088995A (ko) 화상 형성 장치에서 블록체인을 기반한 문서의 보안 및 무결성 검증
US7689900B1 (en) Apparatus, system, and method for electronically signing electronic transcripts
JP4901272B2 (ja) 情報生成処理プログラム、情報生成装置及び情報生成方法
US6993656B1 (en) Time stamping method using aged time stamp receipts
US7574607B1 (en) Secure pipeline processing
US7490241B1 (en) Time stamping method employing user specified time
KR100579147B1 (ko) 전자문서파일의 위변조 검증 전자문서관리시스템 및 그를이용한 방법
WO2012114601A1 (fr) Dispositif et programme de traitement d'informations
WO2005109207A1 (fr) Méthode pour acquérir automatiquement une authentification de temps de fichier électronique et terminal de communication ayant une fonction d’acquisition automatique d’authentification de temps de fichier électronique
JP4157751B2 (ja) コンテンツ流通システム、流通管理サーバ装置、付加情報参照ユーザ端末装置、プログラム及び記録媒体

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

WWW Wipo information: withdrawn in national office

Country of ref document: DE

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP